We use cookies to ensure that we give you the best experience on our website. By continuing to use this website, you agree to our Cookie Notice & Privacy Notice. However, you can change your cookie settings at any time.

*Terms and conditions apply. Only valid for those attending certain events across the above courses in March and April 2019, for new bookings confirmed and attended before the 30th April 2019. Pricing has been amended to reflect this discount and courses included in the offer. Not applicable with any other offer, discount structure or bundle purchase. Offer can only be used once. Existing bookings cannot be cancelled and re-booked using the offer. Bookings transferred to dates outside the promotional terms will be charged at RRP. QA's General Terms & Conditions of Business apply.

Top Cyber Courses

View our latest and most popular cyber security training courses.

Cyber Assessments and Talent Profiling Tools

State-of-the-art Cyber Labs

International House is home to the QA Cyber Labs, where companies can simulate real-life cyber attacks on their infrastructure, helping them to prevent & combat breaches without risking their own network.

Cyber Security Loopholes

QA Cyber Security Technical Consultant, Graeme Batsman, argues that just because you have invested in new 'state-of-the-art' defences it does not mean there are not ways round it.
Read the full article

Safer Internet Day 2019

QA Cyber Training Delivery Manager, Mark Amory, discusses Safer Internet Day and its goal to promote the safe and positive use of digital technology for children and young people.
Read the full article

In this research paper George Seba, Cyber Security Technical Consultant, summarises the findings of advanced research into how Google Fit structures geo-location data, where it is stored on the smartwatch, how it is encoded and how synchronization and interaction with a paired phone impacts on the storage of geo-location data on the wearable device.
Read the full article

On Assessing the Impact of Ports Scanning on the Target Infrastructure

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, provides an in-depth analysis of port scan techniques, with extensive information of each scan technique.
Read the full article

SCADA Threats in the Modern Airport

In this research paper Dr John McCarthy, a leading authority on Cyber Security strategy and implementation, conducts a detailed study concerned with Supervisory Control and Data Acquisition
(SCADA) systems that are at the heart of distributed critical infrastructures within airports.
Read the full article

A Comprehensive Security Framework for Heterogeneous IoTs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, looks at the security challenges of using LISP as an overlay to support IoTs communications and highlights the need for a unified security framework for heterogeneous IoTs.
Read the full article

How efficient AntiViruses are: An empirical investigation of AntiViruses with RATs

In this research paper Dr Mahdi Aiash, from the School of Science and Technology at Middlesex University, conducts an empirical investigation of the efficiency of Antivirus programs in detecting malware.
Read the full article

Cyber case studies

Find out what makes QA the trusted training provider for the world's leading organisations.